How can DeadLock be recognized ?


DeadLock can be recognized by "Resource Allocation Graph"(RAG).This graph has vertices which represents the processes and resources in the system and it has also two types of edges.

DeadLock can be recognized by "Resource Allocation Graph"(RAG).This graph has vertices which represents the processes and resources in the system and it has also two types of edges.

1. Request Edge: This edge indicates the request of the any process which required a particular resource.
For Example: Let us consider we have a process P which request resource R then we will have a directed edge like P--->R.

2. Assignment Edge: This edge indicates the allocation of a reource to a particular process.
For Example: Again consider resource R
and process Q Then directed edge will be like this R-->Q.


Related Articles

Apple iPad 2.

It is the latest product of Apple and it has many advance features as compared to the last one.

Top Job Search Website

There are many websites those are providing job information in India.But here I am listing top 10 websites.

More articles: Computer Knowledge

Comments

No responses found. Be the first to comment...


  • Do not include your name, "with regards" etc in the comment. Write detailed comment, relevant to the topic.
  • No HTML formatting and links to other web sites are allowed.
  • This is a strictly moderated site. Absolutely no spam allowed.
  • Name:
    Email: